2. Foreword
Introduction to DoS
Distributed Denial of Service (DDoS)
Permanent Denial of Service (PDoS)
Exception denial of service (XDoS)
Type of Denial of Service
Demo!
Practical Show
3. Attacking is one of the most important issue
in the web
Denial of Service is one of the commonly
method attack in the web world!
It can use to crash any server !
4. A DoS attack is an attempt to make a computer or
network resource unavailable to its intended users.
When the DoS Attacker sends many packets to a
single network adapter, each computer in the
network would experience effects from the DoS
attack
5. A DDoS occurs when multiple systems flood
the bandwidth or resources of a targeted
system.
Type of DDoS :
◦ Trinoo
◦ TFN/TFN2K
◦ Stacheldraht
6. A PDoS is an attack that damages a system so
badly that it requires replacement or reinstallation
of hardware.
Unlike the DDoS attack,a PDoS attack exploits
security flaws which allow remote administration
on the management interfaces of the victim's
hardware, such as routers, printers, or other
networking hardwares.
7. An XDoS attack is a content-borne attack whose
purpose is to shut down a web service or system
running that service.
A common XDoS attack occurs when an XML
message is sent with a multitude of digital
signatures and a naive parser would look at each
signature and use all the CPU cycles, eating up all
resources
8. LAND
◦ A LAND attack involves IP packets where the source and
destination address are set to address the same device.
◦ The reason a LAND attack works is because it causes the
machine to reply to itself continuously.
Latteria
◦ It’s like to LAND attack but it work on multiple port.
Ping of death
◦ A Ping of death occurs when a flood of ping packet send
with more than 64 Kbyte length toward the target.
9. Teardrop Attacks
◦ A Teardrop attack involves sending mangled IP
fragments with overlapping, over-sized payloads to
the target machine.
SYN flood
◦ SYN flood sends a flood of
TCP/SYN packets, often with
a forged sender address.
10. Smurf attack
◦ It relies on misconfigured network devices that allow
packets to be sent to all computer hosts on a particular
network via the broadcast address of the network, rather
than a specific machine.